summaryrefslogtreecommitdiff
path: root/src/lib/libssl/src/ssl/ssltest.c
diff options
context:
space:
mode:
Diffstat (limited to 'src/lib/libssl/src/ssl/ssltest.c')
-rw-r--r--src/lib/libssl/src/ssl/ssltest.c98
1 files changed, 0 insertions, 98 deletions
diff --git a/src/lib/libssl/src/ssl/ssltest.c b/src/lib/libssl/src/ssl/ssltest.c
index 1f5014baf3..879bf4b3ed 100644
--- a/src/lib/libssl/src/ssl/ssltest.c
+++ b/src/lib/libssl/src/ssl/ssltest.c
@@ -178,9 +178,6 @@
178#ifndef OPENSSL_NO_DH 178#ifndef OPENSSL_NO_DH
179#include <openssl/dh.h> 179#include <openssl/dh.h>
180#endif 180#endif
181#ifndef OPENSSL_NO_SRP
182#include <openssl/srp.h>
183#endif
184#include <openssl/bn.h> 181#include <openssl/bn.h>
185 182
186#define _XOPEN_SOURCE_EXTENDED 1 183#define _XOPEN_SOURCE_EXTENDED 1
@@ -227,46 +224,6 @@ static unsigned int psk_server_callback(SSL *ssl, const char *identity,
227 unsigned char *psk, unsigned int max_psk_len); 224 unsigned char *psk, unsigned int max_psk_len);
228#endif 225#endif
229 226
230#ifndef OPENSSL_NO_SRP
231/* SRP client */
232/* This is a context that we pass to all callbacks */
233typedef struct srp_client_arg_st {
234 char *srppassin;
235 char *srplogin;
236} SRP_CLIENT_ARG;
237
238#define PWD_STRLEN 1024
239
240static char *
241ssl_give_srp_client_pwd_cb(SSL *s, void *arg)
242{
243 SRP_CLIENT_ARG *srp_client_arg = (SRP_CLIENT_ARG *)arg;
244 return BUF_strdup((char *)srp_client_arg->srppassin);
245}
246
247/* SRP server */
248/* This is a context that we pass to SRP server callbacks */
249typedef struct srp_server_arg_st {
250 char *expected_user;
251 char *pass;
252} SRP_SERVER_ARG;
253
254static int
255ssl_srp_server_param_cb(SSL *s, int *ad, void *arg)
256{
257 SRP_SERVER_ARG *p = (SRP_SERVER_ARG *) arg;
258
259 if (strcmp(p->expected_user, SSL_get_srp_username(s)) != 0) {
260 fprintf(stderr, "User %s doesn't exist\n", SSL_get_srp_username(s));
261 return SSL3_AL_FATAL;
262 }
263 if (SSL_set_srp_server_param_pw(s, p->expected_user, p->pass, "1024") < 0) {
264 *ad = SSL_AD_INTERNAL_ERROR;
265 return SSL3_AL_FATAL;
266 }
267 return SSL_ERROR_NONE;
268}
269#endif
270 227
271static BIO *bio_err = NULL; 228static BIO *bio_err = NULL;
272static BIO *bio_stdout = NULL; 229static BIO *bio_stdout = NULL;
@@ -311,10 +268,6 @@ sv_usage(void)
311#ifndef OPENSSL_NO_PSK 268#ifndef OPENSSL_NO_PSK
312 fprintf(stderr, " -psk arg - PSK in hex (without 0x)\n"); 269 fprintf(stderr, " -psk arg - PSK in hex (without 0x)\n");
313#endif 270#endif
314#ifndef OPENSSL_NO_SRP
315 fprintf(stderr, " -srpuser user - SRP username to use\n");
316 fprintf(stderr, " -srppass arg - password for 'user'\n");
317#endif
318 fprintf(stderr, " -ssl3 - use SSLv3\n"); 271 fprintf(stderr, " -ssl3 - use SSLv3\n");
319 fprintf(stderr, " -tls1 - use TLSv1\n"); 272 fprintf(stderr, " -tls1 - use TLSv1\n");
320 fprintf(stderr, " -CApath arg - PEM format directory of CA's\n"); 273 fprintf(stderr, " -CApath arg - PEM format directory of CA's\n");
@@ -484,12 +437,6 @@ main(int argc, char *argv[])
484#ifndef OPENSSL_NO_ECDH 437#ifndef OPENSSL_NO_ECDH
485 EC_KEY *ecdh = NULL; 438 EC_KEY *ecdh = NULL;
486#endif 439#endif
487#ifndef OPENSSL_NO_SRP
488 /* client */
489 SRP_CLIENT_ARG srp_client_arg = {NULL, NULL};
490 /* server */
491 SRP_SERVER_ARG srp_server_arg = {NULL, NULL};
492#endif
493 int no_dhe = 0; 440 int no_dhe = 0;
494 int no_ecdhe = 0; 441 int no_ecdhe = 0;
495 int no_psk = 0; 442 int no_psk = 0;
@@ -577,19 +524,6 @@ main(int argc, char *argv[])
577 no_psk = 1; 524 no_psk = 1;
578#endif 525#endif
579 } 526 }
580#ifndef OPENSSL_NO_SRP
581 else if (strcmp(*argv, "-srpuser") == 0) {
582 if (--argc < 1)
583 goto bad;
584 srp_server_arg.expected_user = srp_client_arg.srplogin= *(++argv);
585 tls1 = 1;
586 } else if (strcmp(*argv, "-srppass") == 0) {
587 if (--argc < 1)
588 goto bad;
589 srp_server_arg.pass = srp_client_arg.srppassin= *(++argv);
590 tls1 = 1;
591 }
592#endif
593 else if (strcmp(*argv, "-ssl2") == 0) 527 else if (strcmp(*argv, "-ssl2") == 0)
594 ssl2 = 1; 528 ssl2 = 1;
595 else if (strcmp(*argv, "-tls1") == 0) 529 else if (strcmp(*argv, "-tls1") == 0)
@@ -895,42 +829,10 @@ bad:
895 } 829 }
896#endif 830#endif
897 } 831 }
898#ifndef OPENSSL_NO_SRP
899 if (srp_client_arg.srplogin) {
900 if (!SSL_CTX_set_srp_username(c_ctx, srp_client_arg.srplogin)) {
901 BIO_printf(bio_err, "Unable to set SRP username\n");
902 goto end;
903 }
904 SSL_CTX_set_srp_cb_arg(c_ctx, &srp_client_arg);
905 SSL_CTX_set_srp_client_pwd_callback(c_ctx, ssl_give_srp_client_pwd_cb);
906 /*SSL_CTX_set_srp_strength(c_ctx, srp_client_arg.strength);*/
907 }
908
909 if (srp_server_arg.expected_user != NULL) {
910 SSL_CTX_set_verify(s_ctx, SSL_VERIFY_NONE, verify_callback);
911 SSL_CTX_set_srp_cb_arg(s_ctx, &srp_server_arg);
912 SSL_CTX_set_srp_username_callback(s_ctx, ssl_srp_server_param_cb);
913 }
914#endif
915 832
916 c_ssl = SSL_new(c_ctx); 833 c_ssl = SSL_new(c_ctx);
917 s_ssl = SSL_new(s_ctx); 834 s_ssl = SSL_new(s_ctx);
918 835
919#ifndef OPENSSL_NO_KRB5
920 if (c_ssl && c_ssl->kssl_ctx) {
921 char localhost[MAXHOSTNAMELEN + 2];
922
923 if (gethostname(localhost, sizeof localhost - 1) == 0) {
924 localhost[sizeof localhost - 1] = '\0';
925 if (strlen(localhost) == sizeof localhost - 1) {
926 BIO_printf(bio_err, "localhost name too long\n");
927 goto end;
928 }
929 kssl_ctx_setstring(c_ssl->kssl_ctx, KSSL_SERVER,
930 localhost);
931 }
932 }
933#endif /* OPENSSL_NO_KRB5 */
934 836
935 for (i = 0; i < number; i++) { 837 for (i = 0; i < number; i++) {
936 if (!reuse) 838 if (!reuse)